Libextractor Multiple Heap Buffer Overflow Vulnerabilities
BID:18021
CVE-2006-2458 |Info
Libextractor Multiple Heap Buffer Overflow Vulnerabilities
| Bugtraq ID: | 18021 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-2458 |
| Remote: | Yes |
| Local: | No |
| Published: | May 17 2006 12:00AM |
| Updated: | Nov 28 2006 08:20PM |
| Credit: | Luigi Auriemma <[email protected]> discovered these vulnerabilities. |
| Vulnerable: |
S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 10.1 libextractor libextractor 0.5.13 Gentoo Linux Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 |
| Not Vulnerable: |
libextractor libextractor 0.5.14 |
Discussion
Libextractor Multiple Heap Buffer Overflow Vulnerabilities
The libextractor library is affected by multiple buffer-overflow vulnerabilities. The software fails to perform sufficient boundary checks of user-supplied input before copying it to insufficiently sized memory buffers.
An attacker exploits these issues by enticing a vulnerable user to open a malformed file using an application that employs libextractor.
This issue allows attackers to execute arbitrary machine code in the context of applications that use the affected library, aiding them in the remote compromise of affected computers.
Version 0.5.13 of libextractor is vulnerable to these issues; other versions may also be affected.
The libextractor library is affected by multiple buffer-overflow vulnerabilities. The software fails to perform sufficient boundary checks of user-supplied input before copying it to insufficiently sized memory buffers.
An attacker exploits these issues by enticing a vulnerable user to open a malformed file using an application that employs libextractor.
This issue allows attackers to execute arbitrary machine code in the context of applications that use the affected library, aiding them in the remote compromise of affected computers.
Version 0.5.13 of libextractor is vulnerable to these issues; other versions may also be affected.
Exploit / POC
Libextractor Multiple Heap Buffer Overflow Vulnerabilities
The following proof-of-concept exploit code is available:
The following proof-of-concept exploit code is available:
Solution / Fix
Libextractor Multiple Heap Buffer Overflow Vulnerabilities
Solution:
The vendor has released libextractor 0.5.14 to address these issues.
Please see the referenced vendor advisories for further information.
libextractor libextractor 0.5.13
Solution:
The vendor has released libextractor 0.5.14 to address these issues.
Please see the referenced vendor advisories for further information.
libextractor libextractor 0.5.13
-
libextractor libextractor-0.5.14.tar.gz
http://gnunet.org/libextractor/download/libextractor-0.5.14.tar.gz
References
Libextractor Multiple Heap Buffer Overflow Vulnerabilities
References:
References:
- Home Page (libextractor)
- Two heap overflow in libextractor 0.5.13 (rev 2832) (Luigi Auriemma
)